Last active
January 9, 2019 05:45
-
-
Save therahulprasad/5a9bf0b589142de1d99286d78ce6714f to your computer and use it in GitHub Desktop.
Java Reverse Engineering
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Find java-decompiler.jar is generally found in AndrouidStudio/Plugins folder | |
java -cp /path/of/java-decompiler.jar org.jetbrains.java.decompiler.main.decompiler.ConsoleDecompiler -hdc=0 -dgs=1 -rsy=1 -rbr=1 -lit=1 -nls=1 -mpm=60 /path/of/jar/to/be/decompiled.jar /path/of/folder/where/decompiled/jar/will/be/placed/ | |
# Recompress extracted aar into an aar file | |
jar cvf new-aar-filename.aar -C old-decompressed-aar-folder/ . |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment